Search Header Logo

Cybersecurity Midterm

Authored by Nathan Denton

Computers

9th - 12th Grade

Used 24+ times

Cybersecurity Midterm
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tatiana is trying to upload her homework submission before the midnight deadline. As she tries to upload the document, the site crashes and she is unable to submit her work by the due date.

Confidentiality

Integrity

Availability

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following devices is a part of the Internet of Things?

A watch that must be set manually

A security system that only sounds an alarm if the code is not entered correctly

A physical combination padlock for your gym locker

A car with a built-in navigation system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not true about the Internet of Things?

It is the network of devices with the ability to connect and exchange data

It increases our vulnerability to cyber attacks

There are no negative consequences to increased connectivity

It is growing exponentially

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following pieces of information would be safe to include in an online username?

School mascot

Favorite Sport

Year of birth

City of residence

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a characteristic of a credible source?

The author is not named on the website

The domain is .edu or .gov

Multiple scholarly sources are cited

The source is well-organized and follows rules of spelling and grammar

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A type of malware that steals and holds your data hostage until you pay a fee is called ____.

Phishing

Ransomware

Hackerware

Spyware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mariel comes across an urgent email in her inbox. It looks to be from her bank letting her know that her account has been deactivated due to suspicious activity. There is a link in the email for her to click to verify recent purchases. There is also a file attached named June Statement. Which action is the best for Mariel to take?

Call her bank or go directly to the bank's website to confirm whether the email is legitimate or not.

Assume that the email is a phishing email and delete it.

Download the attached file to confirm whether the email is legitimate or not

Click on the link in the email, but be wary of any information that is requested.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?